Christophe Bidan

According to our database1, Christophe Bidan authored at least 37 papers between 1996 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2018
Location-Proof System based on Secure Multi-Party Computations.
IACR Cryptol. ePrint Arch., 2018

On the Leakage of Corrupted Garbled Circuits.
IACR Cryptol. ePrint Arch., 2018

Enhancing Collaboration Between Security Analysts in Security Operations Centers.
Proceedings of the Risks and Security of Internet and Systems, 2018

2016
Preventive information flow control through a mechanism of split addresses.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Experimentation of Privacy Protection for JPEG Contents on Image-Sharing Platforms.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

VEGAS: Visualizing, exploring and grouping alerts.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Privacy Protection for JPEG Content on Image-Sharing Platforms.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

A Self-correcting Information Flow Control Model for the Web-Browser.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

Robust and Secure Image Encryption Schemes During JPEG Compression Process.
Proceedings of the Imaging and Multimedia Analytics in a Web and Mobile World 2016, 2016

2014
CORGI: combination, organization and reconstruction through graphical interactions.
Proceedings of the 11th Workshop on Visualization for Cyber Security, 2014

2013
Trust-based security for the OLSR routing protocol.
Comput. Commun., 2013

ELVIS: Extensible Log VISualization.
Proceedings of the 10th Workshop on Visualization for Cyber Security, 2013

An Analysis Grid for Privacy-Related Properties of Social Network Systems.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

2012
Visualization for Monitoring Network Security Events.
ERCIM News, 2012

AMORES: an architecture for mobiquitous resilient systems.
Proceedings of the 1st European Workshop on AppRoaches to MObiquitous Resilience, 2012

2011
From SSIR to CIDre: A New Security Research Group in Rennes, France.
Proceedings of the First SysSec Workshop 2011, 2011

2010
A Trust-Based IDS for the AODV Protocol.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

2009
Misbehavior Detection Using Implicit Trust Relations in the AODV Routing Protocol.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Trust-Based Countermeasures for Securing OLSR Protocol.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Effectiveness of Trust Reasoning for Attack Detection in OLSR.
Proceedings of the Security in Information Systems, 2008

Autonomic trust reasoning enables misbehavior detection in OLSR.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Model for Trust within Information Technology Management.
Proceedings of the ICEIS 2008, 2008

2007
Security of predefined groups in manets.
Proceedings of the Q2SWinet'07, 2007

Integrating trust reasonings into node behavior in olsr.
Proceedings of the Q2SWinet'07, 2007

Analysis of the implicit trust within the OLSR protocol.
Proceedings of the Trust Management, 2007

2003
Secure long term communities in ad hoc networks.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

An Improved Reference Flow Control Model for Policy-Based Intrusion Detection.
Proceedings of the Computer Security, 2003

Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level.
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002

1998
Customized Remote Execution of Web Agents.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

Characterizing Coordination Architectures According to Their Non-Functional Execution Properties.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

Dealing with Multi-policy Security in Large Open Distributed Systems.
Proceedings of the Computer Security, 1998

Achieving middleware customization in a configuration-based development environment: experience with the Aster prototype.
Proceedings of the Fourth International Conference on Configurable Distributed Systems, 1998

A dynamic reconfiguration service for CORBA.
Proceedings of the Fourth International Conference on Configurable Distributed Systems, 1998

1997
Security Benefits from Software Architecture.
Proceedings of the Coordination Languages and Models, Second International Conference, 1997

1996
Aster: A Framework for Sound Customization of Distributed Runtime Systems.
Proceedings of the 16th International Conference on Distributed Computing Systems, 1996

Aster: a CORBA-based software interconnection system supporting distributed system customization.
Proceedings of the Third International Conference on Configurable Distributed Systems, 1996


  Loading...